Operating Systems and Security
Operating Systems and Security
and Security
Operating systems are the foundation of modern computing,
Protection:
Mechanisms and policy to keep programs and users from
accessing or changing stuff they should not do
Internal to OS
Security:
2
Issues external to OS
Authentication of user, validation of messages, malicious or
accidental introduction of flaws, etc.
The Importance of OS Security
Data Confidentiality System Integrity
Operating systems protect sensitive information from A secure operating system ensures the integrity of the
unauthorized access. This is especially crucial for system, preventing malicious software from altering core
businesses and individuals handling confidential data, system files, compromising performance, or causing
such as financial records, medical information, or instability. This safeguards against malware infections and
intellectual property. data corruption.
preencoded.png
Common Security Threats to Operating Systems
2 BIOS/UEFI Security
Securing the BIOS/UEFI firmware is critical. It prevents
unauthorized access and manipulation of the boot
process. This includes setting strong passwords, disabling
unnecessary features, and keeping the BIOS/UEFI
firmware updated.
(Unified Extensible Firmware Interface)
1 Authentication
Verifying the identity of users, devices, or processes before
granting access.
2 Authorization
Defining and enforcing access permissions based on the
principle of least privilege.
3 Audit Logging
Maintaining comprehensive records of all access attempts
and activities.
preencoded.png
preencoded.png
preencoded.png
File system Permissions and Access Controls
Permissions Description
Access Control Lists (ACLs) Provide granular control over who can access specific files
and directories, defining permissions for individual users
and groups.
Keeping the OS Up-to-Date
Security Patches
Software updates often include security patches that
address vulnerabilities and fix bugs. By keeping the
operating system and its applications up-to-date, you
mitigate the risk of exploitation.
Automatic Updates
Enable automatic updates to ensure that your operating
system is always up-to-date with the latest security
patches. This eliminates the need for manual updates,
reducing the risk of vulnerabilities.
Software Updates
Ensure that all software applications running on your
system, including utilities, drivers, and third-party programs,
are also kept up-to-date with the latest security patches and
updates.
Utilising Firewalls and Network Security
•Security Threats: Snooping can lead to further security breaches, including identity
Preventive Measures:
•Encryption: Encrypt data to protect it from unauthorized access.
•Network Security: Use secure network protocols and firewalls to safeguard data in
transit.
•Access Control: Implement strong access controls and monitor systems for
Malware Protection and Incident
Response
Antivirus and Antimalware
Detecting, preventing, and removing malicious software to
protect the system.
Incident Response
Implementing a structured process to identify, contain, and
recover from security incidents.
Forensic Analysis
Investigating security breaches to determine the root cause and
gather evidence.
Staying Ahead of Evolving
Threats
Threat Intelligence Continuously monitoring and
analyzing the latest security
threats and trends.
Protective Measures
Program updates
■ Currently, most programs automatically provide
information on available updates
■ There are helper-applications that automatically check
for updates of installed software
■ Even good antivirus programs check that the installed
software is up-to-date
➢ Excursus on Firewalls
Protective Measures against Malware:
“Healthy“ Suspicion – Always Be Careful!
Passwords are “strong" when they are complex and difficult to guess
Some advice for choosing good passwords:
■ Passwords should be case-sensitive and should contain both
uppercase and lowercase letters
■ Combinations of multiple words are also useful (Passphrase)
■ In addition to letters, passwords should contain digits and
special characters ($% &:; -_? §! ...)
■ Minimum length 12
□ The longer the password length, the higher the security
(because with each additional character the complexity
increases exponentially)
Secure passwords...
special characters
Number_of_password_candidates = (range_of_characters)Password_length
Average_number_of_attempts = Number_of_password_candidates/2
o
36 = 36
* Time required to generate all possible password candidates, when ≙ < 0,001 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4
36 * 36 = 1.296
* Time required to generate all possible password candidates, when ≙ < 0,001 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w
36 * 36 * 36 = 46.656
* Time required to generate all possible password candidates, when ≙ < 0,001 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f
36 * 36 * 36 * 36 = 1.679.616
* Time required to generate all possible password candidates, when ≙ < 0,001 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7
36 * 36 * 36 * 36 * 36 = 60.466.176
* Time required to generate all possible password candidates, when ≙ < 0,001 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7 q
36 * 36 * 36 * 36 * 36 * 36 = 2.176.782.336
* Time required to generate all possible password candidates, when ≙ ~ 0,022 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7 q 2
36 * 36 * 36 * 36 * 36 * 36 * 36 = 78.364.164.096
* Time required to generate all possible password candidates, when ≙ ~ 0,784 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7 q 2 1
36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 = 2.821.109.907.456
* Time required to generate all possible password candidates, when ≙ ~ 28,211 sec*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7 q 2 1 n
36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 = 101.559.956.668.416
* Time required to generate all possible password candidates, when ≙ ~ 16,927 min*
100 billion passwords can be generated per second.
Calculation of the
Number of Possible Password Candidates
o 4 w f 7 q 2 1 n t
36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 * 36 = 3.656.158.440.062.976
* Time required to generate all possible password candidates, when ≙ ~ 10,156 h*
100 billion passwords can be generated per second.
Cracking Complexity
Alphanumeric +
Password Figures Numbers + lower case Alphanumeric Special characters 0-
length [0-9] letters [0-9a-z]. [0-9a-zA-Z]. 9a-zA-Z$% &:; -
until
_? §!...]
5 < 1 sec < 1 sec < 1 sec < 1 sec
6 < 1 sec < 1 sec < 1 sec ~ 7,43 sec
7 < 1 sec < 1 sec ~ 35,79 sec ~ 11,76 min
8 < 1 sec ~ 29,02 sec ~ 36,99 min ~ 18,62 hours
9 < 1 sec ~ 17,41 min ~ 1,59 days ~ 2,43 months
10 < 1 sec ~ 10,45 hours ~ 3,25 months ~ 19,24 years
11 ~ 1 sec ~ 2,24 weeks ~ 16,82 years ~ 18.28 c.
12 ~ 11 sec ~ 1.55 years ~ 10.43 century almost eternal
13 ~ 1.85 min ~ 55,79 years almost eternal almost eternal
14 ~ 18.5 min ~ 20.08 century almost eternal almost eternal
15 ~ 3.09 hours almost eternal almost eternal almost eternal
…
20 ~ 35.33 years almost eternal almost eternal almost eternal
Time needed to create all possible password candidates when 100 billion
passwords can be generated per second